Azure DDoS Protection Standard Overview

Azure DDoS Protection Standard

By Microsoft

0.00★★★★★(0 Ratings)Write review

What is Azure DDoS Protection Standard?

Distributed denial of service (DDoS) attacks are some of the largest availability and security concerns facing customers that are moving their applications to the cloud. A DDoS attack attempts to exhaust an application's resources, making the application unavailable to legitimate users. DDoS attacks can be targeted at any endpoint that is publicly reachable through the internet. Every property in Azure is protected by Azure's infrastructure DDoS (Basic) Protection at no additional cost.

Azure DDoS Protection Standard Details

Azure DDoS Protection Standard Platforms supported

On-Premise Linux

On-Premise Windows

Cloud, SaaS, Web-Based

Desktop Chromebook

Desktop Linux

Desktop Mac

Desktop Windows

Mobile Android

Mobile iPad

Mobile iPhone

Azure DDoS Protection Standard Support options

Azure DDoS Protection Standard Training options

Azure DDoS Protection Standard Related Categories

Bot Detection and Mitigation

Cybersecurity

Network Security

DDoS Protection

Azure DDoS Protection Standard Typical customers

Freelancers

Small Businesses

Small to Mid size businesses

Mid size businesses

Mid to Large size enterprises

Large enterprises

Very Large enterprises

Azure DDoS Protection Standard Features

Most valued Azure DDoS Protection Standard features by users

Alerts/Notifications

Dashboard

IT Incident Management

Policy Management

Reporting/Analytics

Server Monitoring

Third Party Integrations

Threat Intelligence

Web Traffic Monitoring

Top Azure DDoS Protection Standard Alternatives & Competitors

1

DataDome

By DataDome

4.7★★★★★(35 Ratings)

Real-time bot protection that deploys in minutes (SaaS) and runs on autopilot. Proud to protect 10,000+ global e-commerce businesses. Read More

2

AppTrana

By Indusface

4.7★★★★★(48 Ratings)

Helps businesses continuously identify the security posture of applications through automated security scans and manual Pen-Testing. Read More